IT Security Structures: Strengths, Weaknesses, and Frameworks
VerifiedAdded on 2022/09/15
|5
|898
|14
Homework Assignment
AI Summary
This assignment provides an overview of network security structures. It begins by defining and describing the use of reference architectures, highlighting their operation and structure in IT systems. The assignment discusses the strengths and weaknesses of these structures. The assignment then explores general and application-specific architectures, providing detailed definitions of each. The assignment concludes with a recommendation of suitable frameworks and architectures for small businesses, schools, homes, and offices based on appropriate selection criteria. The document includes references to support the analysis and recommendations.

Running head: OVERVIEW OF NETWORK SECURITY
OVERVIEW OF NETWORK SECURITY
Name of the Student:
Name of the University:
Author’s Note:
OVERVIEW OF NETWORK SECURITY
Name of the Student:
Name of the University:
Author’s Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1OVERVIEW OF NETWORK SECURITY
How are these structures predominately used? Discuss their strengths and weaknesses?
It is Conceptual outlines that describe the operation and structure of the IT systems in the
business. Outlines are more common than the essentials of Architecture. It is a wide-ranging
architectural pattern to help designers and software designers design and construct their
industrial IoT structures based on manufacturing recommended methodologies. The reference
architecture also aids create a standard architectural method across the IoT environment. The
framework is complete and covers aspects defined in the reference architecture, counting various
perspectives such as commercial, functional, and execution [1]. The outline also covers several
characteristics of security, counting physical, origins of trust, documentation, access control,
integrity security, and control.
Strength:-
A reference architecture can respond to many of the most usual questions for methods
that need a specific design. They can be handy to software designers because they deliver a
verified explanation to a problem domain, and decrease sure of the difficulties involved in
planning a software architecture. This structure is proven, in both practical as well as commercial
contexts, as feasible solutions for certain complications.
Weakness:-
This design resolution makes a weakness in this security architecture, which can be
effectively oppressed by an interloper with reverse-engineering abilities. While this instance
happens throughout the design procedure, specific architectural weaknesses can be presented
throughout the application of architectural decisions.
How are these structures predominately used? Discuss their strengths and weaknesses?
It is Conceptual outlines that describe the operation and structure of the IT systems in the
business. Outlines are more common than the essentials of Architecture. It is a wide-ranging
architectural pattern to help designers and software designers design and construct their
industrial IoT structures based on manufacturing recommended methodologies. The reference
architecture also aids create a standard architectural method across the IoT environment. The
framework is complete and covers aspects defined in the reference architecture, counting various
perspectives such as commercial, functional, and execution [1]. The outline also covers several
characteristics of security, counting physical, origins of trust, documentation, access control,
integrity security, and control.
Strength:-
A reference architecture can respond to many of the most usual questions for methods
that need a specific design. They can be handy to software designers because they deliver a
verified explanation to a problem domain, and decrease sure of the difficulties involved in
planning a software architecture. This structure is proven, in both practical as well as commercial
contexts, as feasible solutions for certain complications.
Weakness:-
This design resolution makes a weakness in this security architecture, which can be
effectively oppressed by an interloper with reverse-engineering abilities. While this instance
happens throughout the design procedure, specific architectural weaknesses can be presented
throughout the application of architectural decisions.

2OVERVIEW OF NETWORK SECURITY
Discuss the nature of these architectures categorically a) general b) application-specific?
General:-
Design can be measured as a Reference Architecture as long as it monitors the strategies
specified as being universal and directed towards explaining specific concerns within a,
particularly focused atmosphere. A DoD‐wide Reference Architecture must also deliver the
essential elements – purpose, philosophies, special situations and strategies, frameworks, and
vocabulary – in a particular form or other within the architecture [2]. By their nature, self-
expanding structures are also not standing. To simplify the developmental tasks for such
changing and complex systems, users distribute them by time into stages and development steps,
in addition to breaking down actions into stages of detail.
Application-specific:-
The benefit of the outside reference architecture is that variation to an object identifier
taking place in a single system can be more broadcast merely to another client systems where a
similar entity is referenced. Both the distinctiveness attribute standards and the application-
specific quality values of the source record exist in the client structure, as shown in the diagram.
Discuss the nature of these architectures categorically a) general b) application-specific?
General:-
Design can be measured as a Reference Architecture as long as it monitors the strategies
specified as being universal and directed towards explaining specific concerns within a,
particularly focused atmosphere. A DoD‐wide Reference Architecture must also deliver the
essential elements – purpose, philosophies, special situations and strategies, frameworks, and
vocabulary – in a particular form or other within the architecture [2]. By their nature, self-
expanding structures are also not standing. To simplify the developmental tasks for such
changing and complex systems, users distribute them by time into stages and development steps,
in addition to breaking down actions into stages of detail.
Application-specific:-
The benefit of the outside reference architecture is that variation to an object identifier
taking place in a single system can be more broadcast merely to another client systems where a
similar entity is referenced. Both the distinctiveness attribute standards and the application-
specific quality values of the source record exist in the client structure, as shown in the diagram.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3OVERVIEW OF NETWORK SECURITY
It does not require effort as well in structures where a vast number of innovative source
records must be consumed and acknowledged on a systematic basis [3]. In systems applying
outside reference architecture, the distinctiveness information wanted for matching must be
arranged on demand from the customer systems where it resides.
Recommend the framework/architecture for small business, school, home, office based on
an appropriate selection criterion
The acceptance of outlines is partially down to the enormous rise in data, knowledge, and
business developments that wanted to run a modern enterprise. Directed by the government’s
business necessities, frameworks deliver a structure that aids architects in supporting the industry
with IT plan, development, and digital alteration [4]. They support architects’ current data into
areas, layers, or opinions, and offer prototypes for detailing opinions for participants. The
reference architecture outlines can differ widely. Some highlight high-level tactical perspectives,
others may concentrate on a competence planning stage, and many deliver ways of arranging
business documents, skill, and structural designs.
It does not require effort as well in structures where a vast number of innovative source
records must be consumed and acknowledged on a systematic basis [3]. In systems applying
outside reference architecture, the distinctiveness information wanted for matching must be
arranged on demand from the customer systems where it resides.
Recommend the framework/architecture for small business, school, home, office based on
an appropriate selection criterion
The acceptance of outlines is partially down to the enormous rise in data, knowledge, and
business developments that wanted to run a modern enterprise. Directed by the government’s
business necessities, frameworks deliver a structure that aids architects in supporting the industry
with IT plan, development, and digital alteration [4]. They support architects’ current data into
areas, layers, or opinions, and offer prototypes for detailing opinions for participants. The
reference architecture outlines can differ widely. Some highlight high-level tactical perspectives,
others may concentrate on a competence planning stage, and many deliver ways of arranging
business documents, skill, and structural designs.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4OVERVIEW OF NETWORK SECURITY
References:-
[1] E.B. Fernandez, R. Monge, and K. Hashizume, Building a security reference architecture for
cloud systems, Requirements Engineering, 21(2), 2016, pp.225-249.
[2] V. Braberman, N. D'Ippolito, J. Kramer, D. Sykes, and S. Uchitel, Morph: A reference
architecture for configuration and behaviour self-adaptation, In Proceedings of the 1st
International Workshop on Control Theory for Software Engineering, 2015, August ,(pp. 9-16).
[3] I. Alqassem, and D. Svetinovic, Towards reference architecture for cryptocurrencies: Bitcoin
architectural analysis, In 2014 IEEE International Conference on Internet of Things (iThings),
and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and
Social Computing (CPSCom), 2014, September ,(pp. 436-443). IEEE.
[4] H. Guntur, J. Ishii, and A. Satoh, Side-channel attack user reference architecture board
SAKURA-G, In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), 2014,
October, (pp. 271-274). IEEE.
References:-
[1] E.B. Fernandez, R. Monge, and K. Hashizume, Building a security reference architecture for
cloud systems, Requirements Engineering, 21(2), 2016, pp.225-249.
[2] V. Braberman, N. D'Ippolito, J. Kramer, D. Sykes, and S. Uchitel, Morph: A reference
architecture for configuration and behaviour self-adaptation, In Proceedings of the 1st
International Workshop on Control Theory for Software Engineering, 2015, August ,(pp. 9-16).
[3] I. Alqassem, and D. Svetinovic, Towards reference architecture for cryptocurrencies: Bitcoin
architectural analysis, In 2014 IEEE International Conference on Internet of Things (iThings),
and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and
Social Computing (CPSCom), 2014, September ,(pp. 436-443). IEEE.
[4] H. Guntur, J. Ishii, and A. Satoh, Side-channel attack user reference architecture board
SAKURA-G, In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), 2014,
October, (pp. 271-274). IEEE.
1 out of 5
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.


